Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 11:27

General

  • Target

    2024-02-12_206ed144330f1b071d8eb5120bda289e_cryptolocker.exe

  • Size

    51KB

  • MD5

    206ed144330f1b071d8eb5120bda289e

  • SHA1

    33392a4a07c929b1694df4db2195bb79b48b8baf

  • SHA256

    3e934a0cf2a18474a0df20eb5adc1020dd39b54dd5a1e0486d05e9505604dc39

  • SHA512

    a1ce7b52ef5301c976318412cc47466bcaedf64dc2144f4b506935ef89198e01215efa67ce79ddddf46a63c3d64bd018279c33dd9a0708007dd6f77996b4f432

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qn8pKIR9O:79mqyNhQMOtEvwDpjBxe8TpXRw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_206ed144330f1b071d8eb5120bda289e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_206ed144330f1b071d8eb5120bda289e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    51KB

    MD5

    336fac681a184347eafc637e84a69228

    SHA1

    9307baacef061afc31d050199a9b699fcf73e792

    SHA256

    66594d78d98db13ce267742b6f0dfec812c726d66de1edc7b1ec90a14e845dd3

    SHA512

    c52f2bb735743ceaa3264f65836ca74a09955f7ac1afbc898e119a72a07117cd161ef3d53e781d460dbc2c1830ddcd74c2fe0c9e73bc339ef9eaa053c8e977b7

  • memory/2436-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2436-1-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2436-2-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2436-6-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2436-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2648-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2648-19-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2648-18-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB